Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright 2010 Justin C. Klein Keane Using Kojoney Open Source Low Interaction Honeypot to Develop Defensive Strategies and Fingerprint Post-Compromise.

Similar presentations


Presentation on theme: "Copyright 2010 Justin C. Klein Keane Using Kojoney Open Source Low Interaction Honeypot to Develop Defensive Strategies and Fingerprint Post-Compromise."— Presentation transcript:

1 Copyright 2010 Justin C. Klein Keane Using Kojoney Open Source Low Interaction Honeypot to Develop Defensive Strategies and Fingerprint Post-Compromise Behavior Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania, School of Arts and Sciences

2 Copyright 2010 Justin C. Klein Keane Background SSH  Secure replacement for telnet  RFC defined protocol (open)  Available on most Linux/Unix machines Ongoing brute force attacks are seen on SSH servers Unfortunately we don't know what are attackers after  Tempting logical fallacy to assume motivation  Threat modeling and risk analysis depend on knowing motivation

3 Copyright 2010 Justin C. Klein Keane Honeypots What is a honeypot?  Service deliberately configured to attract malicious attention Why would you use one?  Tar pit, waste attacker time  Early warning, warn of attacks  Profiling, determine the types of attacks that are being utilized against your resources

4 Copyright 2010 Justin C. Klein Keane Types of Honeypots High interaction  Full system installation  Advantage is attacker has a full stack to interact with  Disadvantage is attacker has more tools, could hide or break out of the honeypot Low interaction  Software implementation that simulates a system  Controlled environment, but is much easier for attackers to detect

5 Copyright 2010 Justin C. Klein Keane Danger! Downstream liability  Attackers could user your honeypot as a launching pad to attack others  Attackers could host malicious content on your server  Attacker could use your honeypot as a dump site for illegal material Pivot point  Attackers could end-run access control to internal resources using the honeypot

6 Copyright 2010 Justin C. Klein Keane Logistical Considerations Resource intensive  Set up is time consuming, installation of OS and configuring software  Analysis – it takes time to pore through logs and recreate attacker activity  Redeployment can be a hassle, although virtual machine snap-shots make this much easier

7 Copyright 2010 Justin C. Klein Keane Kojoney Open source low interaction SSH honeypot  Written in Python so it should work on any platfrom http://kojoney.sourceforge.net/ Has some flaws...  Static timestamps, many commands unsupported, limited filesystem, etc.

8 Copyright 2010 Justin C. Klein Keane How Kojoney Works How it works  Negotiates a full SSH session with attackers  Takes attacker input, logs it, examines it and responds with simulated output  Allows attackers to download toolkits with wget and curl, but stores the files outside the sandbox

9 Copyright 2010 Justin C. Klein Keane Customization Modified interaction to appear more dynamic Updated directories, using the defaults can be a dead giveaway Added directory functionality so attackers can navigate the structure, create and remove directories Added support for “requested” commands, if we saw attempts to use an unsupported command we built support in Added MySQL database support where all login data and commands are stored which makes reporting and analysis much easier

10 Copyright 2010 Justin C. Klein Keane Setup Kojoney running October 27, 2009, through May 3, 2010. Commodity desktop hardware, just an old Pentium powered machine with 512 MB RAM Dedicated IP Separate management interface

11 Copyright 2010 Justin C. Klein Keane Data Set Observed 109,121 login attempts 596 distinct IP addresses 70 IP's participated in multiple attacks Longest span between attacks was 135 days

12 Copyright 2010 Justin C. Klein Keane Attacks per Hour

13 Copyright 2010 Justin C. Klein Keane Attacks per Day

14 Copyright 2010 Justin C. Klein Keane Attacks per Month

15 Copyright 2010 Justin C. Klein Keane Top 16 Attacks by Country

16 Copyright 2010 Justin C. Klein Keane Top 20 Usernames

17 Copyright 2010 Justin C. Klein Keane Top 20 Passwords

18 Copyright 2010 Justin C. Klein Keane Most Popular Commands (3,062 issued, 181 distinct)

19 Copyright 2010 Justin C. Klein Keane Distinct Commands

20 Copyright 2010 Justin C. Klein Keane Commands by Session

21 Copyright 2010 Justin C. Klein Keane Wget Downloads 282 downloads captured Windows XP SP 3 downloaded 41 times Other popular downloads:  PsyBNC  Other IRC bots  UDP Ping Flooders  Port scanners  SSH brute force tools

22 Copyright 2010 Justin C. Klein Keane Attack Command Analysis Context is key  In 94/150 times 'cat' was used as: cat /proc/cpuinfo Some attacker commands innocuous, others not:  w  uptime  wget  unset

23 Copyright 2010 Justin C. Klein Keane Target Accounts System accounts favorite targets Dictionary lists were uncommon Passwords were relatively complex  Dictionary attack was uncommon Username 'alice' with password 'password' would withstand attacks

24 Copyright 2010 Justin C. Klein Keane Defensive Strategies Use SSH keys Disable remote root login over SSH Run SSH on an alternate port Use login attempt limits to frustrate brute force

25 Copyright 2010 Justin C. Klein Keane Detection Mechanisms Blacklist using: OSSEC  http://www.ossec.net SSH Black  http://www.pettingers.org/code/sshblack.html

26 Copyright 2010 Justin C. Klein Keane Conclusions Blocking by source IP may be feasible Limit access by time of day Use IP to seed examination of other logs 'trojan' certain programs to log activity

27 Copyright 2010 Justin C. Klein Keane Known Hostile Traffic Look for internal source Use IP as seed for log analysis Fingerprint malware captures Look for traceable activity  Creating directories with names like.tmp  unset history


Download ppt "Copyright 2010 Justin C. Klein Keane Using Kojoney Open Source Low Interaction Honeypot to Develop Defensive Strategies and Fingerprint Post-Compromise."

Similar presentations


Ads by Google